IEEE Transactions on Dependable and Secure Computing

IEEE Transactions on Dependable and Secure Computing

IEEE T DEPEND SECURE
影响因子:7.5
是否综述期刊:
是否预警:不在预警名单内
是否OA:
出版国家/地区:UNITED STATES
出版社:Institute of Electrical and Electronics Engineers Inc.
发刊时间:0
发刊频率:Quarterly
收录数据库:SCIE/Scopus收录
ISSN:1545-5971

期刊介绍

IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.
IEEE Transactions on Trustable and Secure Computing(TDSC)发布了档案研究结果,重点研究通过设计、建模和评估支持系统和网络实现所需程度的可靠性和安全性而不影响性能的基础、方法和机制。重点还包括测量、建模和仿真技术,以及联合评估、验证和设计性能、安全性和可靠性约束的基础。
年发文量 386
国人发稿量 245.53
国人发文占比 0.64%
自引率 -
平均录取率0
平均审稿周期 较慢,6-12周
版面费 US$2195
偏重研究方向 工程技术-计算机:软件工程
期刊官网 http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8858
投稿链接 https://mc.manuscriptcentral.com/tdsc-cs

期刊高被引文献

Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700270
Social Network De-Anonymization and Privacy Inference with Knowledge Graph Model
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2697854
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2726066
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2897675
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2627033
AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672991
Privacy-Aware Caching in Information-Centric Networking
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2679711
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913362
FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914117
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2684801
GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2800048
Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2020.3021407
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2922958
Resource-Aware Detection and Defense System Against Multi-Type Attacks in the Cloud: Repeated Bayesian Stackelberg Game
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907946
Robust and Universal Seamless Handover Authentication in 5G HetNets
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2927664
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2825449
Design and Implementation of the Ascend Secure Processor
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2687463
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712150
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914911
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2700305
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2654438
PersonaIA: A Lightweight Implicit Authentication System Based on Customized User Behavior Selection
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2016.2645208
Lossless Data Hiding Based on Homomorphic Cryptosystem
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2913422
IDEA: Intrusion Detection through Electromagnetic-Signal Analysis for Critical Embedded and Cyber-Physical Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2932736
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2706286
Private Compound Wildcard Queries Using Fully Homomorphic Encryption
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2763593
SDN-Based Privacy Preserving Cross Domain Routing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2811807
Immersive Virtual Reality Attacks and the Human Joystick
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907942
Empirical Analysis and Validation of Security Alerts Filtering Techniques
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714164
CATTmew: Defeating Software-only Physical Kernel Isolation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946816
Refinement-Based Specification and Security Analysis of Separation Kernels
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2672983
Denoising in the Dark: Privacy-Preserving Deep Neural Network Based Image Denoising
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2907081
AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2714166
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2923215
Multitenant Access Control for Cloud-Aware Distributed Filesystems
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2715839
DeepFuzzer: Accelerated Deep Greybox Fuzzing
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2961339
Reducing Timing Side-Channel Information Leakage Using 3D Integration
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2712156
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2938953
KALD: Detecting Direct Pointer Disclosure Vulnerabilities
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2915829
Mobile Crowdsourcing Task Allocation with Differential-and-Distortion Geo-Obfuscation
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2912886
Stochastic Model Checking for Predicting Component Failures and Service Availability
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2017.2650901
Looking Back! Using Early Versions of Android Apps as Attack Vectors
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914202
A Highly Efficient Side Channel Attack with Profiling through Relevance-Learning on Physical Leakage Information
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2864727
PSpec-SQL: Enabling Fine-Grained Control for Distributed Data Analytics
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2914209
SAIS: Self-Adaptive Identification of Security Bug Reports
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2939132
An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946073
STYX: A Hierarchical Key Management System Oriented to Elastic Content Delivery Networks on Public Clouds
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2019.2918278
Security of streaming media communications with logistic map and self-adaptive detection-based steganography
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2946138
Another Look at Anonymous Communication
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/TDSC.2018.2828002
PVOPM: Verifiable Privacy-preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
来源期刊:IEEE Transactions on Dependable and Secure ComputingDOI:10.1109/tdsc.2019.2947436

质量指标占比

研究类文章占比 OA被引用占比 撤稿占比 出版后修正文章占比
100.00%7.71%--

相关指数

影响因子
影响因子
年发文量
自引率
Cite Score

预警情况

查看说明
时间 预警情况
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
*来源:中科院《 国际期刊预警名单》

JCR分区

WOS分区等级:Q1区
版本 按学科 分区
WOS期刊SCI分区
WOS期刊SCI分区
WOS期刊SCI分区是指SCI官方(Web of Science)为每个学科内的期刊按照IF数值排 序,将期刊按照四等分的方法划分的Q1-Q4等级,Q1代表质量最高,即常说的1区期刊。
(2024-2025年最新版)
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Q1

中科院分区

查看说明
版本 大类学科 小类学科 Top期刊 综述期刊
2025年3月最新升级版
计算机科学2区
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE 计算机:硬件
1区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
1区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
2区
2023年12月升级版
计算机科学2区
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE 计算机:硬件
1区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
2区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
2区
2022年12月旧的升级版
计算机科学2区
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE 计算机:硬件
1区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
1区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
2区